A DNS-based Blackhole List (DNSBL) or Real-time Blackhole List (RBL) is an effort to stop email spamming. It is a “blacklist” of locations on the Internet reputed to send email spam. The locations consist of IP addresses which are most often used to publish the addresses of computers or networks …
Read More »Shortest spam run ever – domaincop.org Domain Abuse Notice Spam
Woke up this morning and found two emails from domaincorp.org in my Inbox stating my domains are being used for spamming and spreading malware recently. Subject line contained “Domain Abuse Notice” which looked serious!
Read More »Setup honeypot in Kali Linux
The Pentbox is a safety kit containing various tools for streamlining PenTest conducting a job easily. It is programmed in Ruby and oriented to GNU / Linux, with support for Windows, MacOS and every systems where Ruby is installed. In this small article we will explain how to set up …
Read More »OSI Layers – Please Do Not Tell Secret Passwords Anytime
I had an interesting day at work trying to figure out how best I can setup a service for a client who is sending UDP licensing traffic through some high-end networking devices over VPN. UDP by design is unreliable. This was causing issues as the UDP packet size was over the …
Read More »Advantages disadvantages of using Proxy vs VPN vs TOR vs TOR and VPN together.
What makes you truly anonymous and leaves next to no trace in the internet? In this post I will discuss the advantages disadvantages of Proxy vs VPN vs TOR vs TOR and VPN together. Internet is a huge and gravely important part of our life these days. It is not …
Read More »